A multi-objective secure routing method for wireless sensor network

Document Type : English Original Article

Authors

1 Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran

2 Department of Computer , Dezful Branch, Islamic Azad university, Dezful, Iran

Abstract

The wireless sensor network is a wireless network of self-organized sensors that are distributed at intervals. These sensors are used to group measurements of specific physical quantities or environmental conditions such as temperature, sound, vibration, pressure, motion, or pollutants at various locations. Energy efficiency to extend a wireless sensor network's lifetime should be considered in all network design areas, including hardware and software. Wireless sensor networks may be used in critical applications and transmit sensitive data, so they need methods to secure the data. Secure routing in wireless sensor networks is vital due to the need for data confidentiality, integrity, energy efficiency, authentication, and resilience against attacks. It ensures sensitive data remains private, prevents tampering, optimizes energy usage, verifies node authenticity, and defends against attacks. This paper presents a secure routing method in wireless sensor networks. In the proposed method, due to the nodes' processing limitations and to ensure the security of the exchanged messages, the lightweight columnar transposition cipher method is used. The routing process is done hop by hop, and the next hop is selected based on the parameters of remaining energy, distance to the base station, and node traffic. The proposed routing method is implemented by MATLAB and compared with SMEER and KID-SASR methods. The simulation results show a reduction of end-to-end delay of 50% and 38%, reduction of energy consumption of 39% and 20%, reduction of packet loss rate, and increased number of live nodes by 66% and 59% compared to SMEER and KID-SASR.

Keywords


[1] BenSaleh, M. S., Saida, R., Kacem, Y. H., & Abid, M., “Wireless sensor network design methodologies: A survey”, Journal of Sensors, pp. 1-13, 2020.‏
[2] Guillermo, J. C., García-Cedeño, A., Rivas-Lalaleo, D., Huerta, M., & Clotet, R., “Iot architecture based on wireless sensor network applied to agricultural monitoring: A case of study of cacao crops in ecuador”. In Advances in Information and Communication Technologies for Adapting Agriculture to Climate Change II: Proceedings of the 2nd International Conference of ICT for Adapting Agriculture to Climate Change (AACC'18), pp. 21-23, 2018.
[3] Jabbar, S., Asif Habib, M., Minhas, A. A., Ahmad, M., Ashraf, R., Khalid, S., & Han, K., “Analysis of factors affecting energy aware routing in wireless sensor network”, Wireless Communications and Mobile Computing, pp. 1-21, 2018.‏
[4] Karray, F., Jmal, M. W., Garcia-Ortiz, A., Abid, M., & Obeid, A. M., “A comprehensive survey on wireless sensor node hardware platforms”, Computer Networks, Vol.144, pp. 89-110, 2018.
[5] Kumar, A., Zhao, M., Wong, K. J., Guan, Y. L., & Chong, P. H. J., “A comprehensive study of IoT and WSN MAC protocols: Research issues, challenges and opportunities”, IEEE Access, Vol.6, pp. 76228-76262, 2018.‏
[6] Mihai, V., Dragana, C., Stamatescu, G., Popescu, D., & Ichim, L., “Wireless sensor network architecture based on fog computing”. In 2018 5th International Conference on Control, Decision and Information Technologies (CoDIT), pp. 743-747, 2018.‏
[7] Verma, G., & Sharma, V., “A novel thermoelectric energy harvester for wireless sensor network application”, IEEE Transactions on Industrial Electronics, Vol.66, No.5, pp. 3530-3538, 2018.‏
[8] Mohamed, R. E., Saleh, A. I., Abdelrazzak, M., & Samra, A. S., “Survey on wireless sensor network applications and energy efficient routing protocols”, Wireless Personal Communications, Vol.101, pp. 1019-1055, 2018.‏
[9] Parween, S., & Hussain, S. Z., “A review on cross-layer design approach in WSN by different techniques”, Adv. Sci. Technol. Eng. Syst, Vol.5, No.4, pp. 741-754, 2020.‏
[10] Samara, G., Besani, G. A., Alauthman, M., & Khaldy, M. A., “Energy-efficiency routing algorithms in wireless sensor networks: A survey” arXiv preprint arXiv: 2002.07178, 2020.‏
[11] Shinghal, D. K., & Srivastava, N., “Wireless sensor networks in agriculture: for potato farming”, Available at SSRN 3041375, 2017.‏
[12] Singh, R., & Verma, A. K., “Efficient image transfer over WSN using cross layer architecture”, Optik, Vol.130, pp. 499-504, 2017.‏
[13] Tharakan, L. A., Dhanasekaran, R., & Suresh, A., “Data Security in WSN-Based Internet of Things Architecture Using LDS Algorithm: WSN Architecture With Energy-Efficient Communication”, In Edge Computing and Computational Intelligence Paradigms for the IoT pp. 170-195, 2019‏
[14] Bhasin, V., Kumar, S., Saxena, P. C., & Katti, C. P., “Security architectures in wireless sensor network”, International Journal of Information Technology, Vol.12, No.1, pp. 261-272, 2020.‏
[15] Yu, J. Y., Lee, E., Oh, S. R., Seo, Y. D., & Kim, Y. G., “A survey on security requirements for WSNs: focusing on the characteristics related to security”, IEEE Access, Vol.8, pp. 45304-45324, 2020.‏
[16] Viswanathan, S., & Kannan, A., “Elliptic key cryptography with Beta Gamma functions for secure routing in wireless sensor networks”, Wireless Networks, Vol.25, pp. 4903-4914, 2019.‏
[17] Isaac Sajan, R., & Jasper, J., “Trustā€based secure routing and the prevention of vampire attack in wireless ad hoc sensor network”, International Journal of Communication Systems, Vol.33, No.8, pp. e4341, 2020.
[18] Paho, B. N., & Tchendji, V. K., “Secure and energy-efficient geocasting protocol for gps-free hierarchical wireless sensor networks with obstacles”, International Journal of Wireless Information Networks, Vol.27, No.1, pp. 60-76, 2020.‏
[19] Fang, W., Zhang, W., Chen, W., Liu, J., Ni, Y., & Yang, Y., “MSCR: Multidimensional secure clustered routing scheme in hierarchical wireless sensor networks”, EURASIP Journal on Wireless Communications and Networking, pp. 1-20, 2021.‏
[20] Dhand, G., & Tyagi, S. S., “SMEER: secure multi-tier energy efficient routing protocol for hierarchical wireless sensor networks”, Wireless Personal Communications, Vol.105, pp. 17-35, 2019.‏
[21] Mutalemwa, L. C., & Shin, S., “Achieving source location privacy protection in monitoring wireless sensor networks through proxy node routing”, Sensors, Vol.19, No.5, pp. 1037, 2019.‏
[22] Mutalemwa, L. C., & Shin, S., “Routing schemes for source location privacy in wireless sensor networks: A survey”, Journal of the Korean Society of Communication Studies, Vol.43, No.9, pp.1429-1445, 2018.
[23] Bradbury, M., Jhumka, A., & Leeke, M., “Hybrid online protocols for source location privacy in wireless sensor networks’, Journal of Parallel and Distributed Computing, Vol.115, pp. 67-81, 2018.‏
[24] Mitra, R., & Sharma, S., “Proactive data routing using controlled mobility of a mobile sink in wireless sensor networks”, Computers & Electrical Engineering, Vol.70, pp. 21-36, 2018.‏
[25] Mukhtar, M. F., Shiraz, M., Shaheen, Q., Ahsan, K., Akhtar, R., & Changda, W., “Rbm: Region-based mobile routing protocol for wireless sensor networks”, Wireless Communications and Mobile Computing, pp. 1-11, 2021.‏
[26] He, Q., Mou, J., & Lin, B., “A robust self-organizing tree-based routing protocol for wireless sensor networks”, Mathematical Problems in Engineering, pp.1-13, 2021.‏